Design Con 2015
Welcome Guest Log In | Register

Secure Coding Boot Camp

Posted on: Oct 28, 2013 | Duration: 6 - 45 minutes
Course | 484 views
1 0
More Info +- Less Info

To develop the most secure code possible, you need to understand how software security vulnerabilities work and how to avoid them.

Focusing on a set of eight security weaknesses identified by CWE (including injection flaws, memory leaks and null pointer dereferences), this set of online technical courses describes the cause and impact of each issue, walks you through an example of each, and offers strategies to mitigate the risks they pose.

Check out these no-charge courses today!

View

Please disable any pop-up blockers for proper viewing of this course.

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page